Hitachi Energy UNEM
Hitachi Energy UNEM contains multiple cryptographic weaknesses (CWE-326, CWE-321, CWE-319) affecting all versions from R9C through R16A. These vulnerabilities allow unauthorized users to obtain sensitive information and gain access to network elements managed by UNEM, and could cause availability issues. The vulnerabilities are remotely exploitable with low attack complexity and no authentication required. Partial remediation is available in UNEM R16A; full remediation for CVE-2021-40341 and CVE-2021-40342 is expected in an upcoming release.
- Network access to UNEM management interface or client-server communication channels
- No valid credentials required for exploitation
- Ability to observe or intercept network traffic between NMS clients and UNEM server
Patching may require device reboot — plan for process interruption
/api/v1/advisories/534508ae-0e51-4e47-b85e-f1317e54260bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.